Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 07:48
Static task
static1
Behavioral task
behavioral1
Sample
NameBomb.exe
Resource
win10v2004-20240709-en
General
-
Target
NameBomb.exe
-
Size
8KB
-
MD5
6bb79d73a1ac2c86804c2096b00b8ded
-
SHA1
e1e94b5add65854fbab992e188bfb3b7717a784b
-
SHA256
4bb7aa314779b18c2e511ce1ff63e109567e328fd0898fcdee7964bc5eedea9a
-
SHA512
9de24ee6e8f57916bbe03ce4d1ef699a6fe00bf54a63fc0cedd2083f8d41bb98ba0417a35a0b4011e1abc4f908f45fefcd5ea184a7de05d31f7a2c3fd4f055fb
-
SSDEEP
96:ElQ6lQmoVYk+uHHBA1SRYHM49EEZv3RMFj0+w0LvbZlw8ut/Vf0CI5zNt:n6lQBYk+G+AbFec0+w0LDZVut/Vf0x7
Malware Config
Signatures
-
Credentials from Password Stores: Credentials from Web Browsers 1 TTPs
Malicious Access or copy of Web Browser Credential store.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NameBomb.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2020 NameBomb.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Credential Access
Credentials from Password Stores
2Credentials from Web Browsers
1Windows Credential Manager
1Unsecured Credentials
1Credentials In Files
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
129B
MD5a526b9e7c716b3489d8cc062fbce4005
SHA12df502a944ff721241be20a9e449d2acd07e0312
SHA256e1b9ce9b57957b1a0607a72a057d6b7a9b34ea60f3f8aa8f38a3af979bd23066
SHA512d83d4c656c96c3d1809ad06ce78fa09a77781461c99109e4b81d1a186fc533a7e72d65a4cb7edf689eeccda8f687a13d3276f1111a1e72f7c3cd92a49bce0f88